https://ecs.ju-journal.org/jujecs/issue/feedJahangirnagar University Journal of Electronics and Computer Science2025-07-03T16:44:18+06:00Professor Mohammad Zahidur Rahmanrmzahid@juniv.eduOpen Journal Systems<p>The Jahangirnagar University Journal of Electronics and Computer Science (JUJECS) is a peer reviewed journal which accepts high quality research articles. The journal is published annually by the Department of Computer Science and Engineering, Jahangirnagar University, focusing on theories, methods and applications in Computer Science & Engineering, Electronics, Information Technology and relevant fields. The goal of the journal is to make the researchers familiar with the current trends of research in the abovementioned fields.</p> <p>JUJECS invites researchers, academics, professionals to submit their original and unpublished articles. Extended versions of papers presented at conferences may be submitted. All articles must be in English. Submitted articles will be reviewed by the members of a review panel composed of eminent researchers from different institutions worldwide. Authors can submit a paper at any time. Following acceptance, a paper will normally be published in the next issue. The journal ensures the authors that the peer review results will be informed within three months from the date of paper submission.</p>https://ecs.ju-journal.org/jujecs/article/view/32Blockchain-based Secure Healthcare System: A test case of Hyperledger Fabric For Medical Data Management2023-09-18T16:35:54+06:00Mallika Dey Mallikamallikaju307@gmail.comAl Imranalimranju02@gmail.com<p>In recent years, the healthcare industry has experienced significant growth in the amount of sensitive information that is being exchanged and stored digitally. This has created new challenges for healthcare organizations in terms of safeguarding patient data from security threats and unauthorized access. Blockchain technology has emerged as a promising solution to address these challenges. This paper proposes a blockchain-based secure healthcare system using Hyperledger Fabric. This system employs smart contracts to manage medical data and access control.</p>2025-06-20T00:00:00+06:00Copyright (c) 2025 Jahangirnagar University Journal of Electronics and Computer Sciencehttps://ecs.ju-journal.org/jujecs/article/view/34Optimization of Cost Function of LAN Using Particle Swarm Optimization and Genetic Algorithm2024-07-05T10:55:27+06:00Md. Imdadul Islamimdad@juniv.eduRifat Araimdad@juniv.eduMd. Asoad Alvi Yanur Saomimdad@juniv.eduSarwar Jahanimdad@juniv.edu<p><strong>Under network planning and optimization, the size of service area of a network has to be estimated to minimize the total cost. In this paper we consider the cost function of wired network of telecommunication switching station, which is applied for wired LAN. The function contains both fixed and variable cost with respect to size of the network and does not provide sharp minima on multidimensional plane hence steepest descent method could not solve the cost function. To overcome the situation, we applied Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) to acquire the optimum size of the network. The theoretical, PSO and GA provide very close results shown both in table and graph.</strong></p>2025-06-20T00:00:00+06:00Copyright (c) 2025 Jahangirnagar University Journal of Electronics and Computer Sciencehttps://ecs.ju-journal.org/jujecs/article/view/35Handover Detection of WAN Using Fuzzy Inference System2023-09-03T09:25:35+06:00Neelima Monjusha Preetiimdad@juniv.eduFaiza Ferozimdad@juniv.eduSarwar Jahanimdad@juniv.eduMd. Imdadul Islamimdad@juniv.edu<p><strong>In Wide Area Network (WAN) users experience frequent handover while on a high-speed vehicle. In 4G and 5G mobile communication, the coverage area of cells is reduced compared to 3G systems therefore handover occurs frequently. An intelligent handover decision is essential to protect unnecessary handover to reduce network overhead on control plane (the activities of control channels). Moreover, handover failure or forced termination deteriorates the QoS of the network on user plane i.e. the data flow of traffic channels. In this paper, a Fuzzy Inference System (FIS) is developed to make the correct decision of handover. Here four fuzzy variables: velocity of mobile station (MS), SNR of received signal, SINR of received signal and acceleration of MS are used, where each of the variables possess 3 to 5 linguistic values. Around 200 Fuzzy rules are applied to link crisp and fuzzy values. Finally, four defuzzification methods: Centroid, Bisection, MOM and</strong><strong> LOM are used to take the decision of handover and a comparison is made among them in both tabular form and using surface plot. All of the four methods ensure correct decision of above 92% and the best one is 100%.</strong></p>2025-06-20T00:00:00+06:00Copyright (c) 2025 Jahangirnagar University Journal of Electronics and Computer Sciencehttps://ecs.ju-journal.org/jujecs/article/view/36Analysis of ICU data of pediatric heart patients 2025-01-26T10:24:44+06:00Sharmin Nahar Sharwardyasharmin34@yahoo.comHasan Sarwarmdhasan70@gmail.comMohammad Zahidur Rahmanrmzahid@juniv.edu<p class="Abstract" style="line-height: 200%;">One of the most fatal conditions for pediatric disease is congenital heart disease (CHD). Reviewing massive databases, comparing them, and mining them for information that can be used to identify, monitor, and treat illnesses like CHD is the key to treating cardiovascular disease. Cardiovascular disease can be predicted, prevented, managed, and treated with great effectiveness using big data analytics, which is well-known all over the world for its useful application in controlling, contrasting, and managing massive datasets. This study analyzes the post-operative ICU data. We analyzed the patient conditions of the ICU patients by using descriptive statistics. Here, we have selected the ICU parameters between different demographic groups by using chi-square test, t test and p value. Besides, this we also used different machine learning method to predict the patient condition. The outcomes will serve as a reference for medical professionals employing big data technology to predict and manage CHD patients in ICU.</p>2025-06-20T00:00:00+06:00Copyright (c) 2025 Jahangirnagar University Journal of Electronics and Computer Sciencehttps://ecs.ju-journal.org/jujecs/article/view/38Optimizing the Fine-tuning Process of Large Language Models2024-07-05T11:31:50+06:00Mahbub Islam Mahimmahim.stu20171@juniv.eduDr. Jugal Krishna Dascedas@juniv.edu<p>We present an optimized fine-tuning process for large language models (LLMs) that combines Low-Rank Adaptation (LoRA) and Quantization. Traditional full fine-tuning methods are computationally expensive, requiring significant GPU memory, which limits their accessibility. In our approach, we first quantize the LLaMA-2 7B model and then apply LoRA fine-tuning to that quantized model. We demonstrate that the combination of quantization and LoRA significantly reduces GPU memory requirements while maintaining model performance. Through rigorous experiments, we successfully fine-tuned the 7B LLaMA-2 model using the CodeAlpaca-20k dataset with only 10.8 GB of GPU memory, compared to the 112 GB required by traditional methods. We further developed an inference system using this optimized fine-tuned model for practical deployment.</p>2025-06-20T00:00:00+06:00Copyright (c) 2025 Jahangirnagar University Journal of Electronics and Computer Sciencehttps://ecs.ju-journal.org/jujecs/article/view/39Study on Transfer Learning Technique for Deepfake Face Detection Using Weighted Average Ensemble Model2025-01-21T22:25:27+06:00Jannatul Mawamawa.stu2017@juniv.eduMd. Humayun Kabirhkabir@juniv.edu<p class="Text" style="text-indent: 0in;"><strong><span style="font-size: 9.0pt; line-height: 105%;">Deepfakes represent a significant cybersecurity threat with their ability to create highly convincing fraudulent media. As deepfake technology becomes more sophisticated and accessible, the potential for cybercrimes such as identity theft, fraudulent account openings, and financial scams increases. To address the rising threat of deepfakes, this research explores detecting deepfake face images by combining transfer learning with an ensemble technique. Four pre-trained models have been employed for the transfer learning task. Finally top three performing models were combined for the ensemble. The ensemble model has been evaluated against a benchmark dataset, namely 140K Real and Fake Faces. The ensemble model significantly surpassed the individual models, achieving an accuracy of</span></strong> <span style="font-size: 9.0pt; line-height: 105%;">81.25%.</span><strong><span style="font-size: 9.0pt; line-height: 105%;"> This research demonstrates the potential of integrating multiple pre-trained models to improve deepfake image detection, laying a strong foundation for future advancements.</span></strong></p>2025-06-20T00:00:00+06:00Copyright (c) 2025 Jahangirnagar University Journal of Electronics and Computer Sciencehttps://ecs.ju-journal.org/jujecs/article/view/40Enhancing Topic Modeling Through Embedding Learning Strategies2025-01-21T22:22:36+06:00Pallabi Biswaspallabi.stu2017@juniv.eduDipankar Baladipubala466@gmail.comLubna Yasmin Pinkylubnacse@mbstu.ac.bdMohammad Ashraful Islamashraful.islam@juniv.edu<p>In the field of Natural Language Processing (NLP), topic modeling is crucial for uncovering patterns in textual data. Recent advances have combined traditional topic modeling with word embeddings, introducing the Embedded Topic Model (ETM). This thesis explores embedding learning strategies within topic modeling to improve the ETM and related models. It delves into more efficient variational inference, advanced word embedding techniques, and strategies for better topic interpretability. Practical implications in document classification, content recommendation, and summarization are evaluated. Scalability challenges for handling large textual corpora are also addressed. The integration of textual data with other modalities is pioneered. This work aims to enhance topic modeling using embedding learning strategies, bridging the gap between theory and practice in NLP.</p>2025-06-20T00:00:00+06:00Copyright (c) 2025 Jahangirnagar University Journal of Electronics and Computer Science